0% found this document useful (0 votes)
1 views20 pages

Training Day2

The document discusses the limitations of subnet masks, highlighting the complexity of managing large networks and the need for additional administrative personnel. It also covers logical topologies, the role of operating systems, and various types of servers, including their functions and classifications. Key components of operating systems and the client-server model are explained, emphasizing the interaction between servers and clients in a networked environment.

Uploaded by

sathvinder.snow
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views20 pages

Training Day2

The document discusses the limitations of subnet masks, highlighting the complexity of managing large networks and the need for additional administrative personnel. It also covers logical topologies, the role of operating systems, and various types of servers, including their functions and classifications. Key components of operating systems and the client-server model are explained, emphasizing the interaction between servers and clients in a networked environment.

Uploaded by

sathvinder.snow
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Limitations of Subnet Mask

● Subnetting can be complex to design and manage in very large


networks.
● Managing multiple subnets requires additional administrative
personnel.
.255
Logical Topologies
Logical topology defines how data flows through a network, regardless of the physical
connections between devices. It describes the logical architecture of a network, including
how data is transmitted and how devices communicate with each other.

peer to peer domain model

A peer-to-peer (P2P) domain model is a decentralized network where all participants (peers)
are equal and act as both clients and servers, sharing resources directly with each other
without a central authority
Operating Systems Essentials

What is an Operating System?


An operating system is the most important software that runs on your computer. It manages the computer's memory
and processes and all of its software and hardware. It enables you to communicate with the computer without knowing
how to speak the computer's language.

Types of Operating System:


Operating systems usually come already loaded on the computer you buy. Normally you use the operating system
that comes with their computer, but it's possible to upgrade or even change operating systems. The three most
common operating systems for personal computers are Microsoft Windows, Mac OS X, Android.

Important Components of the Operating System


The components of operating system are critical in making computer system components operate together.
Below are the top 8 components of an Operating System:
1.Process Management
2.File Management
3.Network Management
4.Main Memory Management
5.Secondary Storage Management
6.I/O Device Management
7.Security Management
8.Command Interpreter System
A server is a computer program or device that provides a service to another computer program and its user, also
known as the client. In a data center, the physical computer that a server program runs on is also frequently
referred to as a server. That machine might be a dedicated server or it might be used for other purposes.

In the client-server model, a server program fulfills requests from client programs, which might be running on the
same computer or other computers. A given application in a computer system might function as a client that
makes requests for services from other programs and as a server fulfilling requests from other programs.
How servers work
The term server can refer to a physical machine, a virtual machine (VM) or software that's performing server
services. Servers work in various ways, depending on how the word server is being used. Server operating
systems (OSes), such as Microsoft Windows Server 2022, typically process client requests for service within the
network and facilitate the linkages with the requested resources. Servers configured for specific services handle
access to specialized resources, such as printer drivers, or to applications, such as file storage, respectively.

Physical and virtual servers


A physical server is simply a computer that's used to run server software
Types of servers
Servers are often categorized in terms of their purpose. A few examples of servers available include the following:

•Web server. A web server is a computer program that serves requested Hypertext Markup Language webpages
or files. In this case, a web browser acts as the client.
•Application server. This type of server provides the business logic for an application program in a computer in a
distributed network.
•Domain Name System server. A critical component for internet activity, the DNS server translates domain names
into IP addresses.
•Proxy server. Proxy server software acts as an intermediary between an endpoint device, such as a
computer, and another server from which a user or client is requesting a service.
•Game server. These servers support the deployment of various computer games and similar applications.
•Mail server. These applications receive incoming emails from local users -- people within the same domain --
and remote senders, and forward outgoing emails for delivery.
•Virtual server. This is a program running on a shared server that's configured in such a way that it seems to
each user that they have complete control of a server.
•Blade server. A blade server is a server chassis housing multiple thin, modular electronic circuit boards,
known as server blades. Each blade is a server in its own right, often dedicated to a single application.
•File server. This is a computer responsible for the central storage and management of data files so that other
computers on the same network can access and share files.
•Policy server. This is a security component of a policy-based network that provides authorization services
and facilitates tracking and control of files.
•Database server. This server is responsible for hosting one or more databases. Client applications perform
database queries that retrieve data from or write data to the database that is hosted on the server.
•Print server. This server provides users with access to one or more network-attached printers. The print
server acts as a queue for the print jobs that users submit. Some print servers can prioritize the jobs in the print
queue based on the job type or who submitted the print job

You might also like